Security Guideline
Incident Response Guideline for SMEs
Cyber attacks evolve rapidly as the costs and efforts required for hackers to launch attacks are decreasing due to the development of automation and computing powers. This leads to increased cyber attacks targeting different organisations (including public or private, multinational or local organisations). As most small...
Release Date: 29 Jul 2022
4304 Views

Cloud Storage Security
In light of the rapid development of the Internet and the popularity of mobile devices, the demand in cloud storage continuously increases. Cloud storage has no geographical restriction, making the service available around the globe; plus that the requirement in information security differs in every country...
Release Date: 31 May 2022
5670 Views

Data Protection Guideline
The recent incidents of personal information leakage have attracted much public attention. Have you been worrying about your own data privacy? Do you know what risks are associated with storing data on the computer? What measures are available to mitigate these risks? This guideline is divided...
Release Date: 6 May 2022
10599 Views

Personal VPN Security Guideline
Objective
Virtual private network (VPN) is one of the commonly used security technologies that have been widely used in an enterprise environment for employee remote access. On the other hand, it is also applied in protecting personal online privacy and security, which is known...
Release Date: 24 Nov 2020
6761 Views

Enterprise VPN Security Guideline
The Enterprise VPN is a common technology to support remote working during global pandemic outbreak. However, adopting enterprise VPN without proper risk assessment and corresponding mitigation measures could lead to a security incident. It is common to find that cyber-attacks targeting enterprise VPN appliances, ...
Release Date: 9 Nov 2020
6141 Views

IoT Device (ZigBee) Security Study
Industries all over the world are keeping up with the trend of Internet of Things (IoT), by developing and applying products with built-in IoT-related function. ZigBee, as one of the wireless technologies with low-power consumption and a simple set-...
Release Date: 8 May 2020
3277 Views

10 measures to secure Zoom Meetings
Due to the global outbreak of COVID-19, many companies and education institutes have arranged staff and teachers to work or teach from home, resulting in more people using web meeting software for communication. With its ease of use and rich features, Zoom has been...
Release Date: 3 Apr 2020
5344 Views

Assessing the Security of Remote Access Services Guideline
Remote access services enable workers of a company to access corporate IT services and their work files anytime, anywhere. When opting to use remote access services, a company must consider the security strength and weakness of different solutions, besides their user-friendliness and cost. ...
Release Date: 3 Apr 2020
3919 Views
Six Security Tips for Home Office
With the recent outbreak of novel coronavirus infection, many companies in Hong Kong have arranged their staff to work from home to reduce the risk of spreading the disease in the community. This arrangement presents a new challenge for both the companies and their employees. While advancements...
Release Date: 3 Apr 2020
3645 Views

HKCERT Releases New Study to Raise Security Awareness of Wi-Fi Devices
The applications of the Internet of Things (IoT) are becoming more diverse with the rapid development of wireless technology. Each type of IoT devices need to adopt the appropriate wireless technology to suit its application requirements, with Wi-Fi being the most popular wireless networking...
Release Date: 31 Mar 2020
2939 Views
